Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Junko Nakajima
@inproceedings{DBLP:conf/ches/MatsuiN07, author = {Mitsuru Matsui and Junko Nakajima}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {On the Power of Bitslice Implementation on Intel Core2 Processor}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {121--134}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_9}, doi = {10.1007/978-3-540-74735-2\_9}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/MatsuiN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc3713, author = {Mitsuru Matsui and Junko Nakajima and Shiho Moriai}, title = {A Description of the Camellia Encryption Algorithm}, journal = {{RFC}}, volume = {3713}, pages = {1--15}, year = {2004}, url = {https://doi.org/10.17487/RFC3713}, doi = {10.17487/RFC3713}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc3713.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/NakajimaM03, author = {Junko Nakajima and Mitsuru Matsui}, title = {Performance Analysis and Parallel Implementation of Dedicated Hash Functions on Pentium {III}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {86-A}, number = {1}, pages = {54--63}, year = {2003}, url = {http://search.ieice.org/bin/summary.php?id=e86-a\_1\_54}, timestamp = {Tue, 08 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/NakajimaM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/AokiIKMMNT02, author = {Kazumaro Aoki and Tetsuya Ichikawa and Masayuki Kanda and Mitsuru Matsui and Shiho Moriai and Junko Nakajima and Toshio Tokita}, title = {The 128-Bit Block Cipher \emph{Camellia}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {85-A}, number = {1}, pages = {11--24}, year = {2002}, url = {http://search.ieice.org/bin/summary.php?id=e85-a\_1\_11}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/AokiIKMMNT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/NakajimaM02, author = {Junko Nakajima and Mitsuru Matsui}, editor = {Lars R. Knudsen}, title = {Performance Analysis and Parallel Implementation of Dedicated Hash Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2332}, pages = {165--180}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46035-7\_11}, doi = {10.1007/3-540-46035-7\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/NakajimaM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/AokiIKMMNT00, author = {Kazumaro Aoki and Tetsuya Ichikawa and Masayuki Kanda and Mitsuru Matsui and Shiho Moriai and Junko Nakajima and Toshio Tokita}, editor = {Douglas R. Stinson and Stafford E. Tavares}, title = {Camellia: {A} 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis}, booktitle = {Selected Areas in Cryptography, 7th Annual International Workshop, {SAC} 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2012}, pages = {39--56}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44983-3\_4}, doi = {10.1007/3-540-44983-3\_4}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/AokiIKMMNT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HasegawaNM98, author = {Toshio Hasegawa and Junko Nakajima and Mitsuru Matsui}, editor = {Hideki Imai and Yuliang Zheng}, title = {A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {182--194}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054024}, doi = {10.1007/BFB0054024}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/pkc/HasegawaNM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.